On Wed, 2015-02-04 at 14:55 -0700, Warren Young wrote: > > On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen at pari.edu> wrote: > > > > Again, the real bruteforce danger is when your /etc/shadow is exfiltrated by a security vulnerability > > Unless you have misconfigured your system, anyone who can copy /etc/shadow already has root privileges. They don’t need to crack your passwords now. You’re already boned. On C5 the default appears to be:- -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow On C6, the default is:- ---------- 1 root root 854 Mar 13 2014 shadow -- Regards, Paul. England, EU. Je suis Charlie.